SlideShare a Scribd company logo
AODV Overview
• AODV is a packet routing protocol designed for use in mobile
ad hoc networks (MANET)
• Intended for networks that may contain thousands of nodes
• One of a class of demand-driven protocols
– The route discovery mechanism is invoked only if a route to a
destination is not known
• UDP is the transport layer protocol
• Source, destination and next hop are addressed using IP
addressing
• Each node maintains a routing table that contains information
about reaching destination nodes.
– Each entry is keyed to a destination node.
Routing Table Fields
• Destination IP address
• Destination Sequence Number
• Valid Destination Sequence Number Flag
• Other state and routing flags
• Network Interface
• Hop Count (needed to reach destination)
• Next Hop
• Precursor List
• Lifetime (route expiration or deletion time)
Overview (continued)
• Routing table size is minimized by only including next hop
information, not the entire route to a destination node.
• Sequence numbers for both destination and source are used.
• Managing the sequence number is the key to efficient routing
and route maintenance
– Sequence numbers are used to indicate the relative freshness of
routing information
– Updated by an originating node, e.g., at initiation of route discovery or
a route reply.
– Observed by other nodes to determine freshness.
Overview (continued)
• The basic message set consists of:
– RREQ – Route request
– RREP – Route reply
– RERR – Route error
– HELLO – For link status monitoring
AODV Operation – Message Types
• RREQ Messages
– While communication routes between nodes are valid,
AODV does not play any role.
– A RREQ message is broadcasted when a node needs to
discover a route to a destination.
– As a RREQ propagates through the network, intermediate
nodes use it to update their routing tables (in the direction
of the source node).
– The RREQ also contains the most recent sequence number
for the destination.
– A valid destination route must have a sequence number at
least as great as that contained in the RREQ.
RREQ Message
B?
B?
B?
B?
B?
B? B?
B
A
AODV Operation – Message Types
• RREP Messages
– When a RREQ reaches a destination node, the destination
route is made available by unicasting a RREP back to the
source route.
– A node generates a RREP if:
• It is itself the destination.
• It has an active route to the destination. Ex: an intermediate node
may also respond with an RREP if it has a “fresh enough” route to
the destination.
– As the RREP propagates back to the source node,
intermediate nodes update their routing tables (in the
direction of the destination node).
RREP Message
B
A
A
A
A
A
A
A
AODV Operation – Message Types
• RERR Messages
– This message is broadcast for broken links
– Generated directly by a node or passed on when
received from another node
Message routing
A
B D
F
C
G
E
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREP
RREP
RREP
Source
Destination
AODV Routing
• There are two phases
– Route Discovery.
– Route Maintenance.
• Each node maintains a routing table with knowledge about the network.
• AODV deals with route table management.
• Route information maintained even for short lived routes – reverse
pointers.
Entries in Routing Table
• Destination IP Address
• Destination Sequence Number
• Valid Destination Sequence Number flag
• Other state and routing flags (e.g., valid, invalid, repairable, being
repaired)
• Network Interface
• Hop Count (number of hops needed to reach destination)
• Next Hop
• List of Precursors
• Lifetime (expiration or deletion time of the route)
• DSR maintains additional table entries, causing a larger memory overhead
Discovery
• Broadcast RREQ messages.
• Intermediate nodes update their routing table
• Forward the RREQ if it is not the destination.
• Maintain back-pointer to the originator.
• Destination generates RREQ message.
• RREQ sent back to source using the reverse pointer set up
by the intermediate nodes.
• RREQ reaches destination, communication starts.
Algorithm for Discovery
• @Originator
• If a route to the destination is available, start sending data.
• Else generate a RREQ packet. Increment the RREQID by 1.Increment the
sequence number by 1.Destination IP address ,currently available
sequence number included.
• @Intermediate Node
• Generate route reply, if a 'fresh enough' route is a valid route entry for the
destination whose associated sequence number is at least as great as that
contained in the RREQ. Change the sequence number of the destination
node if stale, increment the hop count by 1 and forward.
• @Destination 1.Increment sequence number of the destination.
2.Generate a RREQ message and sent back to Originator.
Maintenance
• Hello messages broadcast by active nodes periodically
HELLO_INTERVAL.
• No hello message from a neighbor in DELETE_PERIOD,link
failure identified.
• A local route repair to that next hop initiated.
• After a timeout ,error propagated both to originator and
destination.
• Entries based on the node invalidated.
RERR Messages
– Message is broadcasted when:
i. A node detects that a link with adjacent neighbor is
broken (destination no longer reachable).
ii. If it gets a data packet destined to a node for which it
does not have an active route and is not repairing.
iii. If it receives a RERR from a neighbor for one or more
active routes.
RERR Processing (for above
broadcasts)
– Build Affected Destination Listing
i. List unreachable destinations containing unreachable neighbor
& destination using unreachable as next hop
ii. Only one unreachable destination, which node already has.
iii. List of nodes where RERR is next hop
– Update information
– Transmit RERR for each item listed
RERR – information update
– Destination Sequence #
- Update sequence # for case i and ii
- Copy sequence # for case iii
– Invalidate route entry
– Update Lifetime field as (currtime +
DELETE_PERIOD)
– Only now may route entry be deleted
RERR message transmission
– Unicast
- Send RERR to single recipient
– Unicast iteritive
- Send RERR to a number of recipients individually
– Broadcast
- Notify multiple recipients simultaniously
- Broadcast via 255.255.255.255 TTL = 1
RERR message transmission
– Unicast
• A node detects that a link with adjacent neighbor is
broken (destination no longer reachable).
• If it gets a data packet destined to a node for which it
does not have an active route and is not repairing.
• If it receives a RERR from a neighbor for one or more
active routes.
– Unicast iteritive
– Broadcast
OLSR Concepts
• Proactive (table-driven) routing protocol
– A route is available immediately when needed
• Based on the link-state algorithm
– Traditionally, all nodes flood neighbor information in a link-state
protocol, but not in OLSR
• Nodes advertise information only about links with neighbors
who are in its multipoint relay selector set
– Reduces size of control packets
• Reduces flooding by using only multipoint relay nodes to send
information in the network
– Reduces number of control packets by reducing duplicate transmissions
OLSR Concepts (2)
• Does not require reliable transfer, since
updates are sent periodically
• Does not need in-order delivery, since
sequence numbers are used to prevent out-of-
date information from being misinterpreted
• Uses hop-by-hop routing
– Routes are based on dynamic table entries
maintained at intermediate nodes
Multipoint Relays
• Each node N in the network selects a set of neighbor nodes as
multipoint relays, MPR(N), that retransmit control packets
from N
– Neighbors not in MPR(N) process control packets from N, but they do
not forward the packets
• MPR(N) is selected such that all two-hop neighbors of N are
covered by (one-hop neighbors) of MPR(N)
1
4
3
5
2
6
7
One optimal set for Node 4:
MPR(4) = { 3, 6 }
Is there another
optimal MPR(4)?
Multipoint Relay Selector Set
• The multipoint relay selector set for Node N, MS(N),
is the set of nodes that choose Node N in their
multipoint relay set
– Only links N-M, for all M such that NMS(M) will be
advertised in control messages
MS(3) = {…, 4, …}
MS(6) = {…, 4, …}
(Assuming bidirectional links)
1
4
3
5
2
6
7
HELLO Messages (1)
• Each node uses HELLO messages to determine its
MPR set
• All nodes periodically broadcast HELLO messages to
their one-hop neighbors (bidirectional links)
• HELLO messages are not forwarded
1
4
3
5
2
6
7
HELLO: NBR(4) = {1,3,5,6}
HELLO Messages (2)
• Using the neighbor list in received HELLO messages,
nodes can determine their two-hop neighborhood
and an optimal (or near-optimal) MPR set
• A sequence number is associated with this MPR set
– Sequence number is incremented each time a new set is
calculated
1
4
3
5
2
6
7
At Node 4:
NBR(1) = {2}
NBR(3) = {2,5}
NBR(5) = {3,6}
NBR(6) = {5,7}
MPR(4) = {3,6}
HELLO Messages (3)
• Subsequent HELLO messages also indicate neighbors
that are in the node’s MPR set
• MPR set is recalculated when a change in the
one-hop or two-hop neighborhood is detected
1
4
3
5
2
6
7
HELLO: NBR(4) = {1,3,5,6}, MPR(4) = {3,6}
MS(6) = {…, 4,…}
MS(3) = {…, 4,…}
TC Messages
• Nodes send topology information in Topology Control
(TC) messages
– List of advertised neighbors (link information)
– Sequence number (to prevent use of stale information)
• A node generates TC messages only for those
neighbors in its MS set
– Only MPR nodes generate TC messages
– Not all links are advertised
• A nodes processes all received TC messages, but only
forwards TC messages if the sender is in its MS set
– Only MPR nodes propagate TC messages
OLSR Example (1)
1
4
3
5
2
6
7
MPR(1) = { 4 }
MPR(2) = { 3 }
MPR(3) = { 4 }
MPR(4) = { 3, 6 }
MPR(5) = { 3, 4, 6 }
MPR(6) = { 4 }
MPR(7) = { 6 }
MS(1) = { }
MS(2) = { }
MS(3) = { 2, 4, 5 }
MS(4) = { 1, 3, 5, 6 }
MS(5) = { }
MS(6) = { 4, 5, 7 }
MS(7) = { }
OLSR Example (2)
• Node 3 generates a TC message advertising
nodes in MS(3) = {2, 4, 5}
• Node 4 forwards Node 3’s TC message since
Node 3  MS(4) = {1, 3, 5, 6}
• Node 6 forwards TC(3) since Node 4  MS(6)
1
4
3
5
2
6
7
TC(3) = <2,4,5>
OLSR Example (3)
• Node 4 generates a TC message advertising nodes in
MS(4) = {1, 3, 5, 6}
• Nodes 3 and 6 forward TC(4) since Node 4  MS(3)
and Node 4  MS(6)
1
4
3
5
2
6
7
TC(4) = <1,3,5,6>
OLSR Example (4)
• Node 6 generates a TC message advertising nodes in
MS(6) = {4, 5, 7}
• Node 4 forwards TC(6) from Node 6 and Node 3
forwards TC(6) from Node 4
• After Nodes 3, 4, and 6 have generated TC messages,
all nodes have link-state information to route to any
node
1
4
3
5
2
6
7
TC(6) = <4,5,7>
OLSR Example (5)
• Given TC information, each node
forms a topology table
• A routing table is calculated from the
topology table
• Note that Link 1-2 is not visible except
to Nodes 2 and 3
TC(3) = <2,4,5>
TC(4) = <1,3,5,6>
TC(6) = <4,5,7>
1
3
5
2
6
7
4
Dest Next Hops
1 4 2
2 2 1
4 4 1
5 5 1
6 4 (5) 2
7 4 (5) 3

More Related Content

What's hot

BGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsBGP FlowSpec experience and future developments
BGP FlowSpec experience and future developments
Pavel Odintsov
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
APNIC
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
Heba_a
 
MPLS
MPLSMPLS
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
Mohammed Abdallah
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
KHNOG
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
ShortestPathFirst
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switchingseanraz
 
7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts
Mostafa El Lathy
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
SuganthiN2
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_Sheetal Kshirsagar
 
Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)
Peter R. Egli
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
Unni Kannan VijayaKumar
 
6LoWPAN
6LoWPAN 6LoWPAN
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 

What's hot (20)

BGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsBGP FlowSpec experience and future developments
BGP FlowSpec experience and future developments
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
 
MPLS
MPLSMPLS
MPLS
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Introduction to sandvine dpi
Introduction to sandvine dpiIntroduction to sandvine dpi
Introduction to sandvine dpi
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_
 
Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)
 
Ospf
 Ospf Ospf
Ospf
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
6LoWPAN
6LoWPAN 6LoWPAN
6LoWPAN
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 

Similar to Performance analysis of AODV And OLSR

DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
Senthil Kanth
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ashok Panwar
 
Ad hoc on demand distance
Ad hoc on demand distanceAd hoc on demand distance
Ad hoc on demand distance
Jimit Rupani
 
2006 aodv-group-presentation
2006 aodv-group-presentation2006 aodv-group-presentation
2006 aodv-group-presentation
nishant kumar
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt
21121A0594
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
Munnakumar518378
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
HODElex
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
HODElex
 
routing
routingrouting
routing
radhika477746
 
Routing
RoutingRouting
Routing
Saima Azam
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
dada827350
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
Sendhil Kumar
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
SeekayAlaisKaruppaia
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
Ad hoc
Ad hocAd hoc
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 

Similar to Performance analysis of AODV And OLSR (20)

DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
 
Ad hoc on demand distance
Ad hoc on demand distanceAd hoc on demand distance
Ad hoc on demand distance
 
2006 aodv-group-presentation
2006 aodv-group-presentation2006 aodv-group-presentation
2006 aodv-group-presentation
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
 
routing
routingrouting
routing
 
Routing
RoutingRouting
Routing
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

Performance analysis of AODV And OLSR

  • 1. AODV Overview • AODV is a packet routing protocol designed for use in mobile ad hoc networks (MANET) • Intended for networks that may contain thousands of nodes • One of a class of demand-driven protocols – The route discovery mechanism is invoked only if a route to a destination is not known • UDP is the transport layer protocol • Source, destination and next hop are addressed using IP addressing • Each node maintains a routing table that contains information about reaching destination nodes. – Each entry is keyed to a destination node.
  • 2. Routing Table Fields • Destination IP address • Destination Sequence Number • Valid Destination Sequence Number Flag • Other state and routing flags • Network Interface • Hop Count (needed to reach destination) • Next Hop • Precursor List • Lifetime (route expiration or deletion time)
  • 3. Overview (continued) • Routing table size is minimized by only including next hop information, not the entire route to a destination node. • Sequence numbers for both destination and source are used. • Managing the sequence number is the key to efficient routing and route maintenance – Sequence numbers are used to indicate the relative freshness of routing information – Updated by an originating node, e.g., at initiation of route discovery or a route reply. – Observed by other nodes to determine freshness.
  • 4. Overview (continued) • The basic message set consists of: – RREQ – Route request – RREP – Route reply – RERR – Route error – HELLO – For link status monitoring
  • 5. AODV Operation – Message Types • RREQ Messages – While communication routes between nodes are valid, AODV does not play any role. – A RREQ message is broadcasted when a node needs to discover a route to a destination. – As a RREQ propagates through the network, intermediate nodes use it to update their routing tables (in the direction of the source node). – The RREQ also contains the most recent sequence number for the destination. – A valid destination route must have a sequence number at least as great as that contained in the RREQ.
  • 7. AODV Operation – Message Types • RREP Messages – When a RREQ reaches a destination node, the destination route is made available by unicasting a RREP back to the source route. – A node generates a RREP if: • It is itself the destination. • It has an active route to the destination. Ex: an intermediate node may also respond with an RREP if it has a “fresh enough” route to the destination. – As the RREP propagates back to the source node, intermediate nodes update their routing tables (in the direction of the destination node).
  • 9. AODV Operation – Message Types • RERR Messages – This message is broadcast for broken links – Generated directly by a node or passed on when received from another node
  • 11. AODV Routing • There are two phases – Route Discovery. – Route Maintenance. • Each node maintains a routing table with knowledge about the network. • AODV deals with route table management. • Route information maintained even for short lived routes – reverse pointers.
  • 12. Entries in Routing Table • Destination IP Address • Destination Sequence Number • Valid Destination Sequence Number flag • Other state and routing flags (e.g., valid, invalid, repairable, being repaired) • Network Interface • Hop Count (number of hops needed to reach destination) • Next Hop • List of Precursors • Lifetime (expiration or deletion time of the route) • DSR maintains additional table entries, causing a larger memory overhead
  • 13. Discovery • Broadcast RREQ messages. • Intermediate nodes update their routing table • Forward the RREQ if it is not the destination. • Maintain back-pointer to the originator. • Destination generates RREQ message. • RREQ sent back to source using the reverse pointer set up by the intermediate nodes. • RREQ reaches destination, communication starts.
  • 14. Algorithm for Discovery • @Originator • If a route to the destination is available, start sending data. • Else generate a RREQ packet. Increment the RREQID by 1.Increment the sequence number by 1.Destination IP address ,currently available sequence number included. • @Intermediate Node • Generate route reply, if a 'fresh enough' route is a valid route entry for the destination whose associated sequence number is at least as great as that contained in the RREQ. Change the sequence number of the destination node if stale, increment the hop count by 1 and forward. • @Destination 1.Increment sequence number of the destination. 2.Generate a RREQ message and sent back to Originator.
  • 15. Maintenance • Hello messages broadcast by active nodes periodically HELLO_INTERVAL. • No hello message from a neighbor in DELETE_PERIOD,link failure identified. • A local route repair to that next hop initiated. • After a timeout ,error propagated both to originator and destination. • Entries based on the node invalidated.
  • 16. RERR Messages – Message is broadcasted when: i. A node detects that a link with adjacent neighbor is broken (destination no longer reachable). ii. If it gets a data packet destined to a node for which it does not have an active route and is not repairing. iii. If it receives a RERR from a neighbor for one or more active routes.
  • 17. RERR Processing (for above broadcasts) – Build Affected Destination Listing i. List unreachable destinations containing unreachable neighbor & destination using unreachable as next hop ii. Only one unreachable destination, which node already has. iii. List of nodes where RERR is next hop – Update information – Transmit RERR for each item listed
  • 18. RERR – information update – Destination Sequence # - Update sequence # for case i and ii - Copy sequence # for case iii – Invalidate route entry – Update Lifetime field as (currtime + DELETE_PERIOD) – Only now may route entry be deleted
  • 19. RERR message transmission – Unicast - Send RERR to single recipient – Unicast iteritive - Send RERR to a number of recipients individually – Broadcast - Notify multiple recipients simultaniously - Broadcast via 255.255.255.255 TTL = 1
  • 20. RERR message transmission – Unicast • A node detects that a link with adjacent neighbor is broken (destination no longer reachable). • If it gets a data packet destined to a node for which it does not have an active route and is not repairing. • If it receives a RERR from a neighbor for one or more active routes. – Unicast iteritive – Broadcast
  • 21. OLSR Concepts • Proactive (table-driven) routing protocol – A route is available immediately when needed • Based on the link-state algorithm – Traditionally, all nodes flood neighbor information in a link-state protocol, but not in OLSR • Nodes advertise information only about links with neighbors who are in its multipoint relay selector set – Reduces size of control packets • Reduces flooding by using only multipoint relay nodes to send information in the network – Reduces number of control packets by reducing duplicate transmissions
  • 22. OLSR Concepts (2) • Does not require reliable transfer, since updates are sent periodically • Does not need in-order delivery, since sequence numbers are used to prevent out-of- date information from being misinterpreted • Uses hop-by-hop routing – Routes are based on dynamic table entries maintained at intermediate nodes
  • 23. Multipoint Relays • Each node N in the network selects a set of neighbor nodes as multipoint relays, MPR(N), that retransmit control packets from N – Neighbors not in MPR(N) process control packets from N, but they do not forward the packets • MPR(N) is selected such that all two-hop neighbors of N are covered by (one-hop neighbors) of MPR(N) 1 4 3 5 2 6 7 One optimal set for Node 4: MPR(4) = { 3, 6 } Is there another optimal MPR(4)?
  • 24. Multipoint Relay Selector Set • The multipoint relay selector set for Node N, MS(N), is the set of nodes that choose Node N in their multipoint relay set – Only links N-M, for all M such that NMS(M) will be advertised in control messages MS(3) = {…, 4, …} MS(6) = {…, 4, …} (Assuming bidirectional links) 1 4 3 5 2 6 7
  • 25. HELLO Messages (1) • Each node uses HELLO messages to determine its MPR set • All nodes periodically broadcast HELLO messages to their one-hop neighbors (bidirectional links) • HELLO messages are not forwarded 1 4 3 5 2 6 7 HELLO: NBR(4) = {1,3,5,6}
  • 26. HELLO Messages (2) • Using the neighbor list in received HELLO messages, nodes can determine their two-hop neighborhood and an optimal (or near-optimal) MPR set • A sequence number is associated with this MPR set – Sequence number is incremented each time a new set is calculated 1 4 3 5 2 6 7 At Node 4: NBR(1) = {2} NBR(3) = {2,5} NBR(5) = {3,6} NBR(6) = {5,7} MPR(4) = {3,6}
  • 27. HELLO Messages (3) • Subsequent HELLO messages also indicate neighbors that are in the node’s MPR set • MPR set is recalculated when a change in the one-hop or two-hop neighborhood is detected 1 4 3 5 2 6 7 HELLO: NBR(4) = {1,3,5,6}, MPR(4) = {3,6} MS(6) = {…, 4,…} MS(3) = {…, 4,…}
  • 28. TC Messages • Nodes send topology information in Topology Control (TC) messages – List of advertised neighbors (link information) – Sequence number (to prevent use of stale information) • A node generates TC messages only for those neighbors in its MS set – Only MPR nodes generate TC messages – Not all links are advertised • A nodes processes all received TC messages, but only forwards TC messages if the sender is in its MS set – Only MPR nodes propagate TC messages
  • 29. OLSR Example (1) 1 4 3 5 2 6 7 MPR(1) = { 4 } MPR(2) = { 3 } MPR(3) = { 4 } MPR(4) = { 3, 6 } MPR(5) = { 3, 4, 6 } MPR(6) = { 4 } MPR(7) = { 6 } MS(1) = { } MS(2) = { } MS(3) = { 2, 4, 5 } MS(4) = { 1, 3, 5, 6 } MS(5) = { } MS(6) = { 4, 5, 7 } MS(7) = { }
  • 30. OLSR Example (2) • Node 3 generates a TC message advertising nodes in MS(3) = {2, 4, 5} • Node 4 forwards Node 3’s TC message since Node 3  MS(4) = {1, 3, 5, 6} • Node 6 forwards TC(3) since Node 4  MS(6) 1 4 3 5 2 6 7 TC(3) = <2,4,5>
  • 31. OLSR Example (3) • Node 4 generates a TC message advertising nodes in MS(4) = {1, 3, 5, 6} • Nodes 3 and 6 forward TC(4) since Node 4  MS(3) and Node 4  MS(6) 1 4 3 5 2 6 7 TC(4) = <1,3,5,6>
  • 32. OLSR Example (4) • Node 6 generates a TC message advertising nodes in MS(6) = {4, 5, 7} • Node 4 forwards TC(6) from Node 6 and Node 3 forwards TC(6) from Node 4 • After Nodes 3, 4, and 6 have generated TC messages, all nodes have link-state information to route to any node 1 4 3 5 2 6 7 TC(6) = <4,5,7>
  • 33. OLSR Example (5) • Given TC information, each node forms a topology table • A routing table is calculated from the topology table • Note that Link 1-2 is not visible except to Nodes 2 and 3 TC(3) = <2,4,5> TC(4) = <1,3,5,6> TC(6) = <4,5,7> 1 3 5 2 6 7 4 Dest Next Hops 1 4 2 2 2 1 4 4 1 5 5 1 6 4 (5) 2 7 4 (5) 3